First published: Mon May 22 2023(Updated: )
Deserialization of Untrusted Data Vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0. Attackers would bypass the 'autoDeserialize' option filtering by adding blanks. Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7674 https://github.com/apache/inlong/pull/7674 to solve it.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache InLong | >=1.4.0<=1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-31058 is a vulnerability that allows attackers to bypass the 'autoDeserialize' option filtering in Apache InLong versions 1.4.0 through 1.6.0 by adding blanks.
The CVE-2023-31058 vulnerability affects Apache InLong versions 1.4.0 through 1.6.0 and allows attackers to bypass the 'autoDeserialize' option filtering.
To mitigate the CVE-2023-31058 vulnerability, it is advised to upgrade to Apache InLong version 1.7.0 or apply the necessary security patches.
CVE-2023-31058 has a severity rating of 7.5 (High).
Yes, you can refer to the official Apache InLong mailing list for more information about the CVE-2023-31058 vulnerability.